Items Tagged with "Cyberwar"

Cyber has very often been called the fifth dimension of warfare in today´s world. However, the reality is different. A major misconception is that the logic of cyber war takes place on a different domain, such as a fifth domain, that is totally separate and disconnected from all other forms of warfare, be it land, sea or air space.

Cyber espionage does not equate with cyber warfare. Espionage may be carried out by multiple actors for manifold reasons. It does not automatically relate to warfare and plays only a minor part in the vast realm of war.

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

The notion of advanced persistent threats (APT) and cyber warfare has reached the mainstream press. As nation states are attacking corporate networks, the need to take defensive action is an imperative.

According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.

I know the Chinese recently held a military exercise under constrained conditions, they even advertised it ex post facto. Why don’t we? I would see that as the perfect opportunity to increase the cross-pollination, knowledge and appreciation between Electronic Warfare and cyber...

A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...

The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...

Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...

A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...

Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...

This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...